Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy-aware access control in XML databases., , and . ADC, volume 104 of CRPIT, page 85-92. Australian Computer Society, (2010)On using collection for aggregation and association relationships in XML object-relational storage., , and . SAC, page 703-710. ACM, (2004)Voronoi-Based Continuous k Nearest Neighbor Search in Mobile Navigation., , , , , , and . IEEE Trans. Ind. Electron., 58 (6): 2247-2257 (2011)An XML Document Warehouse Model., , , and . DASFAA, volume 3882 of Lecture Notes in Computer Science, page 513-529. Springer, (2006)Discovering Conditional Functional Dependencies in XML Data., , and . ADC, volume 115 of CRPIT, page 143-152. Australian Computer Society, (2011)Collection-Intersect Join Algorithms for Parallel Object-Oriented Database Systems., and . Euro-Par, volume 1470 of Lecture Notes in Computer Science, page 505-512. Springer, (1998)Drone services: An investigation via prototyping and simulation., , and . WF-IoT, page 367-370. IEEE, (2018)On Building XML Data Warehouses., , and . IDEAL, volume 3177 of Lecture Notes in Computer Science, page 293-299. Springer, (2004)Performance Analysis of Child/Descendant Queries in an XML-Enabled Database., , , and . ICCSA (3), volume 4707 of Lecture Notes in Computer Science, page 749-762. Springer, (2007)Large scale ontology visualisation using ontology extraction., , , and . IJWGS, 1 (1): 113-135 (2005)